咨询与建议

限定检索结果

文献类型

  • 3,492 篇 会议
  • 1,270 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 4,792 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,715 篇 工学
    • 2,097 篇 计算机科学与技术...
    • 1,724 篇 软件工程
    • 759 篇 信息与通信工程
    • 511 篇 控制科学与工程
    • 389 篇 电气工程
    • 329 篇 生物工程
    • 295 篇 生物医学工程(可授...
    • 289 篇 电子科学与技术(可...
    • 238 篇 网络空间安全
    • 192 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 185 篇 安全科学与工程
    • 167 篇 机械工程
    • 158 篇 化学工程与技术
    • 138 篇 交通运输工程
    • 135 篇 材料科学与工程(可...
  • 1,523 篇 理学
    • 768 篇 数学
    • 405 篇 物理学
    • 384 篇 生物学
    • 270 篇 统计学(可授理学、...
    • 182 篇 化学
    • 170 篇 系统科学
  • 868 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 388 篇 图书情报与档案管...
    • 275 篇 工商管理
  • 357 篇 医学
    • 280 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 159 篇 药学(可授医学、理...
  • 174 篇 法学
    • 145 篇 社会学
  • 102 篇 经济学
  • 90 篇 农学
  • 47 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 3 篇 艺术学

主题

  • 296 篇 accuracy
  • 208 篇 deep learning
  • 175 篇 machine learning
  • 162 篇 real-time system...
  • 156 篇 internet of thin...
  • 150 篇 feature extracti...
  • 146 篇 computational mo...
  • 139 篇 convolutional ne...
  • 123 篇 predictive model...
  • 113 篇 support vector m...
  • 111 篇 training
  • 98 篇 optimization
  • 91 篇 security
  • 86 篇 data models
  • 83 篇 artificial intel...
  • 82 篇 cloud computing
  • 80 篇 technological in...
  • 77 篇 machine learning...
  • 73 篇 data mining
  • 68 篇 neural networks

机构

  • 114 篇 lovely professio...
  • 112 篇 department of co...
  • 105 篇 department of co...
  • 63 篇 department of co...
  • 62 篇 school of comput...
  • 54 篇 gla university d...
  • 52 篇 department of co...
  • 51 篇 maharishi school...
  • 48 篇 department of co...
  • 47 篇 centre of resear...
  • 45 篇 chitkara centre ...
  • 43 篇 lloyd law colleg...
  • 41 篇 lloyd institute ...
  • 39 篇 gla university d...
  • 38 篇 chitkara univers...
  • 35 篇 graphic era deem...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 department of co...
  • 34 篇 the islamic univ...

作者

  • 52 篇 neeraj varshney
  • 43 篇 singh kamred udh...
  • 43 篇 varshney neeraj
  • 42 篇 singh teekam
  • 39 篇 rakesh kumar
  • 37 篇 kumar ankit
  • 34 篇 singh ashutosh k...
  • 32 篇 kumar rakesh
  • 30 篇 kumar gaurav
  • 28 篇 tina babu
  • 26 篇 teekam singh
  • 26 篇 saloni bansal
  • 25 篇 kamred udham sin...
  • 25 篇 asha v.
  • 24 篇 n. naga saranya
  • 23 篇 babu tina
  • 23 篇 ankit kumar
  • 23 篇 pan jeng-shyang
  • 22 篇 patra sudhansu s...
  • 20 篇 bibhuti bhusan d...

语言

  • 3,829 篇 英文
  • 946 篇 其他
  • 27 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Applications in Science and Engineering"
4792 条 记 录,以下是4561-4570 订阅
排序:
Automated writing Assessment of Student's Open-ended Answers Using the Combination of Novel Approach and Latent Semantic Analysis
Automated writing Assessment of Student's Open-ended Answers...
收藏 引用
International Conference on Advanced Computing and Communications (ADCOM)
作者: P. Selvi N.P. Gopalan Research scholar Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli India Department of Computer Applications National Institute of Technology Tiruchirappalli India
In previous work we have applied the novel [7] a method originally designed to evaluate automatic machine translation systems, in assessing short essays written by students [16]. In this paper we present a comparative... 详细信息
来源: 评论
Progressive Image Transmission Using Significant Features and Linear Regression Prediction
Progressive Image Transmission Using Significant Features an...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Chin-chen Chang Jun-chou Chuang Department of Information Engineering and Computer Science Feng Chia University FCU Taichung Taiwan Department of Information Science and Applications Asia University Taichung Taiwan
Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the recei... 详细信息
来源: 评论
An m-ary tree based Frequent Temporal Pattern (FTP) mining algorithm
An m-ary tree based Frequent Temporal Pattern (FTP) mining a...
收藏 引用
IEEE India Conference (INDICON)
作者: N.P. Gopalan B. SivaSelvan Department of Computer Applications National Institute of Technology Tiruchirappalli Tamil Nadu India Department of Computer Science & Engineering National Institute of Technology Tiruchirappalli Tamil Nadu India
Frequent set mining (FSM), an important phase of association rule mining, is the process of generating frequent sets that satisfy a specified minimum support threshold. This paper explores FSM in temporal data domain ... 详细信息
来源: 评论
Performance-Based Content Retrieval for Learning Object Repositories on Grid Environments
Performance-Based Content Retrieval for Learning Object Repo...
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, applications and Technologies (PDCAT)
作者: Wen-Chung Shih Chao-Tung Yang Ping-I Chen Shian-Shyong Tseng Department of Computer Science National Chiao Tung University Hsinchu Taiwan High-Performance Computing Laboratory Department of Computer Science and Information Engineering Tunghai University Taichung Taiwan Department of Information Science and Applications Asia University Taichung Taiwan
The sharable content object reference model (SCORM) has become a popular standard for sharing and reusing teaching materials in the field of e-learning. However, efficient retrieval of SCORM-compliant learning objects... 详细信息
来源: 评论
A Peer-to-Peer Based Framework of InterLibrary Cooperation for Digital Libraries
A Peer-to-Peer Based Framework of InterLibrary Cooperation f...
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, applications and Technologies (PDCAT)
作者: Wen-Chung Shih Chao-Tung Yang Shian-Syong Tseng Chun-Jen Chen National Chi Nan University Nantou Taiwan Department of Computer Science National Chiao Tung University Hsinchu Taiwan High-Performance Computing Laboratory Department of Computer Science and Information Engineering Tunghai University Taichung Taiwan Department of Information Science and Applications Asia University Taichung Taiwan Department of Computer Science and Information Engineering Tunghai University Taichung Taiwan
Traditionally, interlibrary cooperation is an important interaction between libraries. Nevertheless, the emerging digital library architecture has not explicitly supported this requirement. In this paper, we proposed ... 详细信息
来源: 评论
Minimum-Energy Broadcast Using Practical Directional Antennas in All-Wireless Networks
Minimum-Energy Broadcast Using Practical Directional Antenna...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: S. Roy Y. C. Hu D. Peroulis X.-Y. Li School of Electrical and Computer Engineering Center for Wireless Systems and Applications Purdue University West Lafayette IN USA Department of Computer Science Illinois Institute of Technology Chicago IL USA
来源: 评论
A control-design-based solution to robotic ecology: Autonomy of achieving cooperative behavior from a high-level astronaut command
A control-design-based solution to robotic ecology: Autonomy...
收藏 引用
作者: Wang, Jing Qu, Zhihua Ihlefeld, Curtis M. Hull, Richard A. Department of Electrical and Computer Engineering University of Central Florida Orlando FL 32816 United States Kennedy Space Center FL 32899 United States Lockheed Martin Missiles and Fire Control 5600 Sand Lake Rd. MP-450 Orlando FL 32819 United States School of Electrical and Computer Science University of Central Florida IEEE AIAA University of Central Florida Department of Electrical and Computer Engineering National Aeronautics and Space Administration Kennedy Space CenterKennedy Space Center Applied Physics Lab. Advanced Concepts Business Unit Science Applications International Corporation SAIC IEEE Control System Society
In this paper, we propose a cooperative control strategy for a group of robotic vehicles to achieve the specified task issued from a high-level astronaut command. The problem is mathematically formulated as designing ... 详细信息
来源: 评论
Knowledge acquisition assist in analyzing network behaviors
收藏 引用
WSEAS Transactions on computers 2006年 第11期5卷 2642-2649页
作者: Lin, Shun-Chieh Huang, Po-Chih Tseng, Shian-Shyong Jan, Nien-Yi Department of Computer Science National Chiao Tung University 1001 Ta-hsueh Rd. Hsinchu 300 Taiwan Department of Information Science and Applications Asia University 500 Liu-feng Rd. Wufeng Taichung Taiwan Department of Computer Science and Information Engineering Tamkang University 151 Ying-chuan Rd. Tamsui Taipei Taiwan
Many researches have developed different systematic approaches to analyze different network traffic sources for protecting the important network-based applications and services due to the dramatically increasing intru... 详细信息
来源: 评论
An improvement of an efficient user identification scheme based on ID-based cryptosystem
An improvement of an efficient user identification scheme ba...
收藏 引用
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
作者: J.-S. Chou Yalin Chen Chu-Hsing Lin Department of Information Management Nanhua University Chiayi Taiwan Institute of Information Systems and Applications National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering Tunghai University Taichung Taiwan
In this paper an efficient user identification scheme based on ID-based cryptosystem is discussed. In this paper, it is indicated that Hwang et al., scheme is vulnerable to the forgery attack. And also improved scheme... 详细信息
来源: 评论
Outsourcing Security Analysis with Anonymized Logs
Outsourcing Security Analysis with Anonymized Logs
收藏 引用
International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm)
作者: Jianqing Zhang Nikita Borisov William Yurcik Department of Computer Science University of Illinois Urbana-Champaign Urbana IL USA Department of Electrical and Computer Engineering University of Illinois Urbana-Champaign Urbana IL USA National Center for Supercomputing Applications (NCSA) University of Illinois Urbana-Champaign Urbana IL USA
As security monitoring grows both more complicated and more sophisticated, there is an increased demand for outsourcing these tasks to managed security service providers (MSSPs). However, the core problem of sharing p... 详细信息
来源: 评论